Lateral Movement (MITRE ATT&CK: T1076, T1021)
Note: Sometimes, you may have to customise the queries to your environment. Also, queries will only work if the data is available.
Lateral Movement (MITRE ATT&CK: T1076, T1021)
Overview:
Lateral movement involves attackers gaining access to additional systems within the network after an initial compromise. Techniques include using RDP, SMB, or administrative tools like PsExec to move between hosts.
25 Eample Queries for Lateral Movement Detection:
Track RDP Logins (RemoteInteractive Logon Type) RDP logons can be used for lateral movement to access remote systems.
Detect PsExec Use for Remote Command Execution PsExec is a popular tool for executing commands on remote systems.
Monitor SMB Traffic for Lateral Movement SMB (Port 445) can be used for file transfer and lateral movement between systems.
Detect Remote PowerShell Sessions for Lateral Movement PowerShell remoting is often used for lateral movement within a Windows environment.
Track Use of WMI for Remote Code Execution WMI can be used to execute commands remotely on other systems.
Monitor Remote Service Creation (SC.exe) SC.exe is used to create or modify services on remote systems for lateral movement.
Detect New Scheduled Tasks for Lateral Movement Scheduled tasks may be created on remote systems to maintain persistence or execute code.
Track Lateral Movement via Administrative Shares (e.g., ADMIN$) Attackers may use administrative shares for lateral movement.
Monitor Use of Net Use for Remote Drive Mapping Net use can be used to map network drives and facilitate lateral movement.
Detect RDP Logon Attempts from Unusual IPs Unusual RDP logon attempts may indicate unauthorized lateral movement.
Track Use of WinRM for Remote Command Execution WinRM is commonly used for remote administration and lateral movement.
Monitor Use of Remote Desktop for Unusual Sessions RDP may be used to move laterally and establish persistence.
Detect Unusual Administrative Logon Activity (Event ID 4672) Tracking privileged logons can help detect lateral movement via administrative accounts.
Track SMB Logons via Pass-the-Hash Techniques Pass-the-Hash can be used for lateral movement by leveraging NTLM hashes.
Monitor Remote Access via Non-Standard Ports (RDP) RDP access via non-standard ports may indicate lateral movement.
Detect Lateral Movement via Hidden Network Shares Hidden network shares (e.g., C$, ADMIN$) may be used for lateral movement.
Monitor PowerShell Remoting Commands for Lateral Movement PowerShell remoting commands such as Enter-PSSession may be used for lateral movement.
Track SMB Traffic for Remote File Access (Port 445) SMB traffic to shared folders may indicate lateral movement activities.
Detect Remote File Transfers via SMB (Net Use Commands) Net use commands may be used to transfer files over SMB for lateral movement.
Monitor Network Scanning Tools Used for Lateral Movement (e.g., Nmap) Network scanning tools like Nmap may be used to identify targets for lateral movement.
Track Access to Hidden Administrative Shares (IPC$) Access to IPC$ shares may be indicative of lateral movement or reconnaissance.
Detect Use of WMI for Remote Service Creation WMI may be used to create services on remote systems for lateral movement.
Monitor Remote Desktop Sessions from Unusual Geographic Locations RDP sessions from unexpected locations may indicate lateral movement or unauthorized access.
Track Use of Administrative Tools for Remote Access (e.g., WinSCP) Tools like WinSCP may be used for remote access and file transfer during lateral movement.
Monitor Use of RDP for Unusual Logon Times (Off-Hours Access) RDP logons during unusual hours may indicate unauthorized lateral movement.
Last updated